default search action
Zhenhu Ning
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Jiangjiang Zhang, Zhenhu Ning, Muhammad Waqas, Hisham Alasmary, Shanshan Tu, Sheng Chen:
Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization. IEEE Trans. Computers 73(1): 192-205 (2024) - [j29]Jiangjiang Zhang, Zhenhu Ning, Raja Hashim Ali, Muhammad Waqas, Shanshan Tu, Iftekhar Ahmad:
A Many-Objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem. IEEE Trans. Mob. Comput. 23(2): 1330-1346 (2024) - 2023
- [j28]Jiangjiang Zhang, Zhenhu Ning, Fei Xue:
A two-stage federated optimization algorithm for privacy computing in Internet of Things. Future Gener. Comput. Syst. 145: 354-366 (2023) - [j27]Jiangjiang Zhang, Zhenhu Ning, Hangrui Cao:
An intelligent trusted edge data production method for distributed Internet of things. Neural Comput. Appl. 35(29): 21333-21347 (2023) - [c15]Wei Zou, Shanshan Tu, Zhenhu Ning, Jiawei Xu, Shuaikun Xing, Xue Liao:
An improved particle swarm optimization algorithm for P300 Neural network recognizer. ICCNS 2023: 127-135 - 2022
- [j26]Rui Mu, Bei Gong, Zhenhu Ning, Jiangjiang Zhang, Yang Cao, Zheng Li, Wei Wang, Xiaoping Wang:
An identity privacy scheme for blockchain-based on edge computing. Concurr. Comput. Pract. Exp. 34(1) (2022) - [j25]Han Zhong, Zhenhu Ning, Guijun Li, Zheng Li:
A method of core concept extraction based on semantic-weight ranking. Concurr. Comput. Pract. Exp. 34(1) (2022) - [j24]Yu Hong, Zhenhu Ning, Yu Sun, Changxiang Shen:
A dual-system trusted computing node construction method based on ARM multi-core CPU architecture. Concurr. Comput. Pract. Exp. 34(19) (2022) - [j23]Shiqiang Zhang, Dongzhi Cao, Zhenhu Ning:
A decentralized and reliable trust measurement for edge computing enabled Internet of Things. Concurr. Comput. Pract. Exp. 34(24) (2022) - [c14]Xue Liao, Yihua Zhou, Jiawei Xu, Shuaikun Xing, Wei Zou, Jin Zhou, Qi Wang, Zhenhu Ning:
Identity-based Linkable Blind Ring Signature Scheme on Lattice. ICCNS 2022: 51-57 - [c13]Jin Zhou, Zhenhu Ning, Qi Wang, Yuchen Wang:
Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios. ICCNS 2022: 64-68 - [c12]Yu Hong, Zhenhu Ning:
A trusted construction mechanism for sever based on trusted hard disk. ICCNS 2022: 90-97 - [c11]Bei Gong, Zhenhu Ning, Junmiao Liang, Shanshan Tu:
Fast identification method of malicious code based on extreme learning machine. ICSCA 2022: 55-60 - [c10]Bei Gong, Zhenhu Ning, Wenjing Li, Shanshan Tu:
Consensus Algorithm Based on Subject Credit. ICSCA 2022: 108-115 - [c9]Jin Peng, Zhenhu Ning, Shanshan Tu:
Trusted connection architecture of electric IoT. ICSCA 2022: 129-135 - [c8]Bei Gong, Zhenhu Ning, Yi Zhu, Shanshan Tu:
Character-level domain name generation algorithm based on ED-GAN. ICSCA 2022: 198-205 - 2021
- [j22]Zhenhu Ning, Bei Gong, Meng Xu, Caiqiu Zhou:
Trusted data collection for Internet of Things. Concurr. Comput. Pract. Exp. 33(10) (2021) - [j21]Meng Wang, Zhen-Hu Ning, Jing Yu, Chuang-Bai Xiao:
Adaptive Algorithm in Image Reconstruction Based on Information Geometry. KSII Trans. Internet Inf. Syst. 15(2): 461-484 (2021) - [j20]Meng Wang, Jing Yu, Zhen-Hu Ning, Chuangbai Xiao:
Compressed sensing using generative models based on fisher information. Int. J. Mach. Learn. Cybern. 12(10): 2747-2759 (2021) - [j19]Xingjuan Cai, Jiangjiang Zhang, Zhenhu Ning, Zhihua Cui, Jinjun Chen:
A Many-Objective Multistage Optimization-Based Fuzzy Decision-Making Model for Coal Production Prediction. IEEE Trans. Fuzzy Syst. 29(12): 3665-3675 (2021) - [c7]Jiangjiang Zhang, Zhenhu Ning, Kun Zhang, Naixin Kang:
A Multi-objective Optimization Algorithm for Wireless Sensor Network Energy Balance Problem in Internet of Things. BIC-TA (1) 2021: 18-27 - [c6]Dongzhi Cao, Zhenhu Ning, Shiqiang Zhang, Jianli Liu:
An Effective Data Balancing Strategy Based on Swarm Intelligence Algorithm for Malicious Code Detection and Classification. BIC-TA (1) 2021: 160-173 - [c5]Jiangjiang Zhang, Zhenhu Ning, Shiqiang Zhang, Yinggang Liu, Yanbo Ma:
Compressed Sensing Spare Reconstruction Optimization based on the NNIA. ICBDC 2021: 154-160 - [c4]Yongli Yang, Zhenhu Ning, Shiqiang Zhang, Dongzhi Cao:
Efficient Verification of N-GHZ State in Quantum Wireless Network Communication. ICDSP 2021: 213-218 - 2020
- [j18]Quan Liu, Bei Gong, Zhenhu Ning:
Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment. Comput. Commun. 157: 410-416 (2020) - [j17]Meng Wang, Jing Yu, Chuangbai Xiao, Zhenhu Ning, Yang Cao:
Embedding prior knowledge about measurement matrix into neural networks for compressed sensing. Int. J. Wirel. Mob. Comput. 18(3): 282-288 (2020) - [j16]Shiqiang Zhang, Yang Cao, Zhenhu Ning, Fei Xue, Dongzhi Cao, Yongli Yang:
A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value. KSII Trans. Internet Inf. Syst. 14(9): 3615-3638 (2020)
2010 – 2019
- 2019
- [j15]Zhenhu Ning, Guangquan Xu, Naixue Xiong, Yongli Yang, Changxiang Shen, Emmanouil Panaousis, Hao Wang, Kaitai Liang:
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things. IEEE Access 7: 30112-30125 (2019) - [j14]Meng Wang, Chuangbai Xiao, Zhen-Hu Ning, Jing Yu, Yahao Zhang, Jin Pang:
Improved Neural Networks Based on Mutual Information via Information Geometry. Algorithms 12(5): 103 (2019) - [j13]Zhenhu Ning, Yongli Yang, Yahao Zhang:
Research on the trusted protection technology of internet of things. Clust. Comput. 22(6): 14339-14348 (2019) - [j12]Meng Wang, Chuangbai Xiao, Zhen-Hu Ning, Tong Li, Bei Gong:
Neural Networks for Compressed Sensing Based on Information Geometry. Circuits Syst. Signal Process. 38(2): 569-589 (2019) - [j11]Xiaoping Wang, Zhenhu Ning, Wei Wang, Yongli Yang:
Anti-conspiracy attack threshold signature model and protocol. Int. J. Wirel. Mob. Comput. 17(3): 300-306 (2019) - [j10]Meng Wang, Zhen-Hu Ning, Tong Li, Chuangbai Xiao:
Information geometry enhanced fuzzy deep belief networks for sentiment classification. Int. J. Mach. Learn. Cybern. 10(11): 3031-3042 (2019) - 2018
- [j9]Meng Wang, Zhen-Hu Ning, Chuangbai Xiao, Tong Li:
Sentiment Classification Based on Information Geometry and Deep Belief Networks. IEEE Access 6: 35206-35213 (2018) - [j8]Yongli Yang, Zhenhu Ning, Yongquan Cai, Peng Liang, Haifeng Liu:
Research on parallelisation of collaborative filtering recommendation algorithm based on Spark. Int. J. Wirel. Mob. Comput. 14(4): 312-319 (2018) - [j7]Lijuan Duan, Dongkui Zhang, Zhenhu Ning, Fan Xu, Guoqin Cui, Peng Liang:
A novel image encryption method based on hyperchaotic system and pixel information association. Int. J. Wirel. Mob. Comput. 15(3): 207-214 (2018) - [c3]Dongzhi Cao, Xinglan Zhang, Zhenhu Ning, Jianfeng Zhao, Fei Xue, Yongli Yang:
An Efficient Malicious Code Detection System Based on Convolutional Neural Networks. CSAI/ICIMT 2018: 86-89 - [c2]Shiqiang Zhang, Zhenhu Ning, Yang Cao:
Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs. CSAI/ICIMT 2018: 468-473 - [c1]Pin Lv, Lingling Bai, Tingwen Liu, Zhenhu Ning, Jinqiao Shi, Binxing Fang:
Detection of Malicious Domain Names Based on Hidden Markov Model. DSC 2018: 659-664 - 2017
- [j6]Yuehan Wang, Tong Li, Yongquan Cai, Zhenhu Ning, Fei Xue, Di Jiao:
A Novel Anti-Obfuscation Model for Detecting Malicious Code. Int. J. Open Source Softw. Process. 8(2): 25-43 (2017) - [j5]Peiyong Cong, Zhenhu Ning, Fei Xue, Haifeng Liu, Kechao Xu, Haibo Li:
Trusted connection architecture of Internet of Things oriented to perception layer. Int. J. Wirel. Mob. Comput. 12(3): 224-231 (2017) - [j4]Peiyong Cong, Zhenhu Ning, Fei Xue, Kechao Xu, Bo Fan, Haibo Li:
Hierarchy Merkle tree wireless sensor network architecture. Int. J. Wirel. Mob. Comput. 12(4): 341-348 (2017) - [j3]Haiyang Yu, Yongquan Cai, Shanshan Kong, Zhenhu Ning, Fei Xue, Han Zhong:
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. KSII Trans. Internet Inf. Syst. 11(10): 5039-5061 (2017) - 2014
- [j2]Zhen-Hu Ning, Changxiang Shen, Xiaopeng Zhao, Hao Li, Changsong Lin, Yanmei Zhang:
Nonlinear boundary stabilization of the wave equations with variable coefficients and time dependent delay. Appl. Math. Comput. 232: 511-520 (2014) - [j1]Zhen-Hu Ning, Wei Jiang, Jing Zhan, Peng Liang:
Property-Based Anonymous Attestation in Trusted Cloud Computing. J. Electr. Comput. Eng. 2014: 687158:1-687158:7 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint